Finding good differential patterns for attacks on SHA-1

Krystian Matusiewicz*, Josef Pieprzyk

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

10 Citations (Scopus)

Abstract

In this paper we analyse properties of the message expansion algorithm of SHA-1 and describe a method of finding differential patterns that may be used to attack reduced versions of SHA-1. We show that the problem of finding optimal differential patterns for SHA-1 is equivalent to the problem of finding minimal weight codeword in a large linear code. Finally, we present a number of patterns of different lengths suitable for finding collisions and near-collisions and discuss some bounds on minimal weights of them.

Original languageEnglish
Title of host publicationCoding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers
EditorsØyvind Ytrehus
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages164-177
Number of pages14
Volume3969 LNCS
ISBN (Electronic)9783540354826
ISBN (Print)3540354816, 9783540354819
DOIs
Publication statusPublished - 2006
EventInternational Workshop on Coding and Cryptography, WCC 2005 - Bergen, Norway
Duration: 14 Mar 200518 Mar 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3969 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Workshop on Coding and Cryptography, WCC 2005
Country/TerritoryNorway
CityBergen
Period14/03/0518/03/05

Fingerprint

Dive into the research topics of 'Finding good differential patterns for attacks on SHA-1'. Together they form a unique fingerprint.

Cite this